Description
https-proxy-agent before 2.1.1 passes auth option to the Buffer constructor without proper sanitization, resulting in DoS and uninitialized memory leak in setups where an attacker could submit typed input to the 'auth' parameter (e.g. JSON).
Remediation
References
https://hackerone.com/reports/319532
Related Vulnerabilities
CVE-2021-3777 Vulnerability in npm package tmpl
CVE-2022-24847 Vulnerability in maven package org.geoserver.web:gs-web-sec-jdbc
CVE-2021-25931 Vulnerability in maven package org.opennms:opennms-webapp
CVE-2021-23341 Vulnerability in maven package org.webjars.npm:prismjs
CVE-2020-14967 Vulnerability in maven package org.webjars.bowergithub.kjur:jsrsasign